Analysis

  • max time kernel
    151s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 18:29

General

  • Target

    NEAS.93997cdd709e87d47ba526d564d1b7b0.exe

  • Size

    66KB

  • MD5

    93997cdd709e87d47ba526d564d1b7b0

  • SHA1

    e4be49330d9f8314475cd928e86d5b9b3f91fdb8

  • SHA256

    77686f007bd28fb2acc4f037427934bb605bad7e2ad31e8b4f77980ebe99ad81

  • SHA512

    8c5e6ab8b9c3575bb7d16d081fd87d79a84598d7659fe47c274b968de79439ac16c4f7223cc7d50aeb907928725fff3289a9e91ed55d2b29c9e25a2ac388af43

  • SSDEEP

    1536:HLINO/hw9L08Ck0WSfd1/Vjci90BFQq3e60hI5BcgCFC1eX4W/G9ItTYr8G:rIqq/Ck0W09wi99q3ah+cgC81eX4WgI+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 62 IoCs
  • Modifies registry class 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.93997cdd709e87d47ba526d564d1b7b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.93997cdd709e87d47ba526d564d1b7b0.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4928
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:1796
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\NEAS.93997cdd709e87d47ba526d564d1b7b0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies registry class
      PID:3056
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4684

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          66KB

          MD5

          93997cdd709e87d47ba526d564d1b7b0

          SHA1

          e4be49330d9f8314475cd928e86d5b9b3f91fdb8

          SHA256

          77686f007bd28fb2acc4f037427934bb605bad7e2ad31e8b4f77980ebe99ad81

          SHA512

          8c5e6ab8b9c3575bb7d16d081fd87d79a84598d7659fe47c274b968de79439ac16c4f7223cc7d50aeb907928725fff3289a9e91ed55d2b29c9e25a2ac388af43

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          66KB

          MD5

          93997cdd709e87d47ba526d564d1b7b0

          SHA1

          e4be49330d9f8314475cd928e86d5b9b3f91fdb8

          SHA256

          77686f007bd28fb2acc4f037427934bb605bad7e2ad31e8b4f77980ebe99ad81

          SHA512

          8c5e6ab8b9c3575bb7d16d081fd87d79a84598d7659fe47c274b968de79439ac16c4f7223cc7d50aeb907928725fff3289a9e91ed55d2b29c9e25a2ac388af43

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          66KB

          MD5

          93997cdd709e87d47ba526d564d1b7b0

          SHA1

          e4be49330d9f8314475cd928e86d5b9b3f91fdb8

          SHA256

          77686f007bd28fb2acc4f037427934bb605bad7e2ad31e8b4f77980ebe99ad81

          SHA512

          8c5e6ab8b9c3575bb7d16d081fd87d79a84598d7659fe47c274b968de79439ac16c4f7223cc7d50aeb907928725fff3289a9e91ed55d2b29c9e25a2ac388af43

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          66KB

          MD5

          93997cdd709e87d47ba526d564d1b7b0

          SHA1

          e4be49330d9f8314475cd928e86d5b9b3f91fdb8

          SHA256

          77686f007bd28fb2acc4f037427934bb605bad7e2ad31e8b4f77980ebe99ad81

          SHA512

          8c5e6ab8b9c3575bb7d16d081fd87d79a84598d7659fe47c274b968de79439ac16c4f7223cc7d50aeb907928725fff3289a9e91ed55d2b29c9e25a2ac388af43

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          66KB

          MD5

          93997cdd709e87d47ba526d564d1b7b0

          SHA1

          e4be49330d9f8314475cd928e86d5b9b3f91fdb8

          SHA256

          77686f007bd28fb2acc4f037427934bb605bad7e2ad31e8b4f77980ebe99ad81

          SHA512

          8c5e6ab8b9c3575bb7d16d081fd87d79a84598d7659fe47c274b968de79439ac16c4f7223cc7d50aeb907928725fff3289a9e91ed55d2b29c9e25a2ac388af43

        • memory/1160-20-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/1160-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1160-1-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/1796-10-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/1796-13-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/3056-21-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/4684-46-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-52-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-14-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-22-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-23-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-24-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-25-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-26-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-27-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-28-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-29-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-30-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-31-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-32-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-33-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-34-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-35-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-36-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-37-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-38-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-39-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-40-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-41-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-42-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-43-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-44-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-45-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-12-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-47-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-48-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-49-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-50-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-51-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-15-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-53-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-54-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-55-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-56-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-57-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-58-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-59-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-60-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-61-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-62-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-63-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-64-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-65-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-66-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-67-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-68-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-69-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-70-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-71-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-72-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-73-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-74-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-75-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-76-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-77-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-78-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-79-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-80-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4684-186-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4928-6-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4928-7-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/4928-8-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB